Media Room
Tenable News, Announcements and Global Media Coverage
Welcome to the Tenable media room. Read our latest announcements and media coverage, find global contact information and download our media kit below.
Get the latest Tenable News
From innovative product releases to industry research reports to strategic partnerships, get the latest Tenable news and official announcements delivered straight to your inbox.
Press Releases
Tenable Study Reveals 40% of Cyberattacks Breach Saudi Arabian Organisations’ Defences
Tenable-Studie: 44 % der Cyberangriffe durchdringen die Abwehrmechanismen deutscher Unternehmen
41 % des cyber-attaques percent les défenses des entreprises françaises, selon une étude de Tenable
New Tenable Study: 41% of Cyberattacks in Brazil Have Been Successful in Last Two Years
New Tenable Study: 43% of Cyberattacks in Mexico Have Been Successful in Last Two Years
News
The Innovator – Gavin Millard
Deputy CTO Gavin Millard was interviewed by Security Buyer to discuss, what he has dubbed, the 'Jay-Z rule - you've got 99 flaws, but all they need is one.
- Business
- Cybersecurity
- Vulnerability Management
Citrix Warns NetScaler ADC Customers of New Zero-Day Exploitation
A security bulletin published by Citrix on Tuesday informs customers that two new zero-day vulnerabilities affecting its NetScaler ADC and Gateway products have been exploited in attacks. “The impact from these two new zero-day vulnerabilities is not expected to be as significant as CitrixBleed,” Tenable experts said.
- Business
- Cybersecurity
We shall not be moved!
In an interview with Computing Security, Satnam Narang, Senior Staff Research Engineer, discussed how LockBit is breaching some of the world's largest organisations.
- Business
- Cybersecurity
- Vulnerability Management
Cyberattacks breaching defences on massive scale
In this opinion piece, Bernard Montel, EMEA Technical Director and Security Strategist uses data from a recent Tenable study to illustrate the challenge facing organisations.
- Business
- Cybersecurity
- Surveys / Research Data
- Vulnerability Management
Ivanti confirms the exploitation of two new vulnerabilities
Satnam Narang, Senior Staff Research Engineer, offered an analysis of new Ivanti flaws highlighting the risk given that the anticipated wait time for a patch is several weeks.
- Business
- Cyber Breaches
- Cybersecurity
- Vulnerability Management
Prevention is better than cure when it comes to cybersecurity
In this opinion piece, EMEA Technical Director and Security Strategist Bernard Montel discusses the dramatic evolution of the automotive industry and the cyber risks that creates.
- Business
- Cyber Breaches
- Cybersecurity
- Surveys / Research Data
- Vulnerability Management
Ep 182: AI Efficiencies in Cyber – A Double-Edged Sword
Everyday AI •CTO Glen Pendley was interviewed on the Everyday AI podcast this week, talking about generative AI use cases for cyber defenders, highlighting Tenable ExposureAI, which helps customers search faster, analyze faster and make decisions faster.
- Business
- Cybersecurity
Patch Tuesday December 2023
IT Pro •Satnam Narang, Senior Staff Research Engineer offers his analysis of January's Patch Tuesday.
- Business
- Cybersecurity
- Vulnerability Management
Tenable study reveals 40% of cyberattacks breach Saudi Arabian organisations’ defences
Tahawultech News •A Tenable study found that respondents were particularly concerned with the risks associated with cloud infrastructure.
- Business
- Cyber Breaches
- Cybersecurity
- Surveys / Research Data
- Vulnerability Management
Tenable CEO Amit Yoran on rising cyber threats and state of data security
CNBC Worldwide Exchange •Amit Yoran, CEO of Tenable, discusses the cybersecurity landscape following a recent string of cyberattacks.
- Business
- Cybersecurity
North Texas water utility the latest suspected industrial ransomware target
Cybersecurity Dive •Marty Edwards, deputy CTO for OT/IoT at Tenable, said “These attacks are continued evidence that industrial security is in need of significant improvements, and government regulation at some capacity is necessary to ensure the cyber safety of public services like water and wastewater systems."
- Business
- Cybersecurity
Cybersecurity Challenges in 2023: "The Best Defense is Preventive Security Measures"
DevMio •Chief Cybersecurity Strategist Nathan Wenzler breaksdown the findings from the latest Tenable Report, “Old Habits Die Hard: How People, Process and Technology Challenges Are Hurting Cybersecurity Teams.”
- Business
- Cybersecurity
Tenable、「Tenable One」を提供開始--攻撃経路の検出と効率的なリスク管理を支援
ZDNet Japan •- Business
- Corporate News
- Cyber Breaches
- Cybersecurity
Nathan Wenzler discusses the impact of the great reshuffling on cybersecurity
TickerTV •- Business
- Corporate News
- Cyber Breaches
- Cybersecurity
- Vulnerability Management
Glen Pendley on transparency from cloud infrastructure providers
TickerTV •- Corporate News
- Cyber Breaches
- Cyber Policy
- Cybersecurity
- Vulnerability Management
Security in the metaverse, hyper-personalisation and how world events influence cyber incidents
2Factors •- Corporate News
- Cyber Breaches
- Cybersecurity
Satnam Narang talks about the ransomware boom
TickerTV •- Business
- Corporate News
- Cybersecurity
- Surveys / Research Data
Satnam Narang on metaverse threats
TickerTV •- Business
- Corporate News
- Cyber Breaches
- Cybersecurity
- Surveys / Research Data
Addressing SolarWinds Through Executive Action: A Welcomed And Critical Advancement
Forbes •- Business
- Cyber Breaches
- Cyber Policy
- Cybersecurity
- Vulnerability Management
Biden Signs Executive Order to Bolster Federal Government’s Cybersecurity
The New York Times •- Cyber Breaches
- Cyber Policy
Lack of cyber funds in Biden infrastructure plan raises eyebrows
The Hill •- Cyber Policy
Call for comments: European Data Protection Board lays out data breach notification guidelines for organizations
The Daily Swig •- Corporate News
- Cyber Breaches
- Cyber Policy
- Cybersecurity
- Vulnerability Management
The Future Of Cybersecurity Law Hinges On The Supreme Court
Forbes •- Business
- Cyber Breaches
- Cyber Policy
- Cybersecurity
- Government
- Vulnerability Management
Why Develop Thoughtful Cyber Policies When Disjointed Activities And Remaining Vulnerable Feel Good?
Forbes •- Cyber Policy
- Government
The Innovator – Gavin Millard
Security Buyer •Deputy CTO Gavin Millard was interviewed by Security Buyer to discuss, what he has dubbed, the 'Jay-Z rule - you've got 99 flaws, but all they need is one.
- Business
- Cybersecurity
- Vulnerability Management
Citrix Warns NetScaler ADC Customers of New Zero-Day Exploitation
Security Week •A security bulletin published by Citrix on Tuesday informs customers that two new zero-day vulnerabilities affecting its NetScaler ADC and Gateway products have been exploited in attacks. “The impact from these two new zero-day vulnerabilities is not expected to be as significant as CitrixBleed,” Tenable experts said.
- Business
- Cybersecurity
We shall not be moved!
Computing Security •In an interview with Computing Security, Satnam Narang, Senior Staff Research Engineer, discussed how LockBit is breaching some of the world's largest organisations.
- Business
- Cybersecurity
- Vulnerability Management
Cyberattacks breaching defences on massive scale
Computing Security •In this opinion piece, Bernard Montel, EMEA Technical Director and Security Strategist uses data from a recent Tenable study to illustrate the challenge facing organisations.
- Business
- Cybersecurity
- Surveys / Research Data
- Vulnerability Management
Ivanti confirms the exploitation of two new vulnerabilities
Le Mag IT •Satnam Narang, Senior Staff Research Engineer, offered an analysis of new Ivanti flaws highlighting the risk given that the anticipated wait time for a patch is several weeks.
- Business
- Cyber Breaches
- Cybersecurity
- Vulnerability Management
Prevention is better than cure when it comes to cybersecurity
Just Auto •In this opinion piece, EMEA Technical Director and Security Strategist Bernard Montel discusses the dramatic evolution of the automotive industry and the cyber risks that creates.
- Business
- Cyber Breaches
- Cybersecurity
- Surveys / Research Data
- Vulnerability Management
Scott McKinnel discusses industry study findings with TickerTV Australia
TickerTV Australia •- Business
- Corporate News
- Cybersecurity
- Surveys / Research Data
- Vulnerability Management
Microsoft Teams security flaw left users defenseless against serious cyberattacks
Tech Radar Pro •- Cyber Breaches
- Cybersecurity
- Surveys / Research Data
Vulnerability in Microsoft Teams granted attackers access to emails, messages, and personal files
The Daily Swig •- Cyber Breaches
- Cybersecurity
- Surveys / Research Data
- Vulnerability Management
Crypto fraudsters used Elon Musk's SNL appearance 'to fleece people of up to $10million in new Twitter scam'
Daily Mail •- Cyber Breaches
- Cybersecurity
- Surveys / Research Data
Tenable Research Finds Scammers Made Over $10 Million with Fake Cryptocurrency Giveaway Scams
AiThority •- Cybersecurity
- Surveys / Research Data
The cybersecurity lessons from 2020
IoT Now •- Cyber Breaches
- Cybersecurity
- Surveys / Research Data
Ivanti confirms the exploitation of two new vulnerabilities
Le Mag IT •Satnam Narang, Senior Staff Research Engineer, offered an analysis of new Ivanti flaws highlighting the risk given that the anticipated wait time for a patch is several weeks.
- Business
- Cyber Breaches
- Cybersecurity
- Vulnerability Management
Prevention is better than cure when it comes to cybersecurity
Just Auto •In this opinion piece, EMEA Technical Director and Security Strategist Bernard Montel discusses the dramatic evolution of the automotive industry and the cyber risks that creates.
- Business
- Cyber Breaches
- Cybersecurity
- Surveys / Research Data
- Vulnerability Management
Patch Tuesday December 2023
IT Pro •Satnam Narang, Senior Staff Research Engineer offers his analysis of January's Patch Tuesday.
- Business
- Cybersecurity
- Vulnerability Management
Tenable study reveals 40% of cyberattacks breach Saudi Arabian organisations’ defences
Tahawultech News •A Tenable study found that respondents were particularly concerned with the risks associated with cloud infrastructure.
- Business
- Cyber Breaches
- Cybersecurity
- Surveys / Research Data
- Vulnerability Management
Adopting Proactive Cybersecurity in Healthcare
The Journal of mHealth •In an opinion piece EMEA Technical Director and Security Strategist, Bernard Montel, outlines how hospitals and healthcare professionals can take action to understand the risks faced and address challenges to reduce the volume of successful cyberattacks they have to respond to.
- Cybersecurity
- Vulnerability Management
Why organisations must protect data from the quantum threat
Technology Magazine •In an interview with Technology Magazine Deputy CTO, Gavin Millard, discusses the threat from quantum computing arguing that, "As advances in quantum computing are made, decryption at lightning speed is increasingly possible".
- Cybersecurity
- Vulnerability Management